Search security leadership articles...

From Professional to Leader

Strategies and tactics to become a confident leader in cybersecurity

Latest Cybersecurity Must-Reads

Mandos subscribers are already ahead. Don't miss out!

Mandos cybersecurity leadership article on The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge

The Builder Strikes Back: How Security Teams Must Reclaim Their Engineering Edge

The vendor dependency trap is crippling security teams. AI is democratizing building capabilities that were once vendor-exclusive. Develop these five critical skills now before your competitors do.

Mar 25 7 min read
5 AI Agent Types Modern Security Teams Must Know About

5 AI Agent Types Modern Security Teams Must Know About

I've decoded the AI agent types that are revolutionizing enterprise cybersecurity programs. Are you leveraging all five? Discover which ones your security team is missing and how you can use them for your advantage.

Feb 27 8 min read
How to Transition from Individual Cybersecurity Contributor to Strategic Leader by Nikoloz Kokhreidze

How to Transition from a Security Engineer or Analyst to a Strategic Leader

Unlock your leadership potential in cybersecurity. Learn to communicate business value, build strategic networks, and embrace mentorship to bridge the gap between technical expertise and executive roles.

Oct 15 4 min read
Building intelligence-led SOC, practical guide for cybersecurity leaders

3 Critical Steps to Build an Intelligence-Led SOC

Learn how to transform your Security Operations Center from reactive to proactive. Discover key strategies to overcome common challenges and build an intelligence-led SOC.

Oct 8 5 min read
AI data pipelines and security

CISO's Guide to Securing the AI Data Pipeline

CISOs face unprecedented challenges in securing AI data pipelines. Learn about the complexities, risks, and a three-step guide to fortify your AI security posture.

Oct 1 6 min read
Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Choosing a Security Operations Center: In-House, Hybrid, or Outsourced

Struggling to choose between an in-house, hybrid or outsourced Security Operations Center (SOC)? This guide helps you weigh pros, cons, costs, and business goals to make an informed decision.

Sep 17 14 min read
The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance.

The Perils of Platform Dependence: Lessons from the Great CrowdStrike Meltdown

The CrowdStrike Falcon Sensor update on July 19, 2024 caused global system outages, exposing risks of single vendor reliance. Learn why a resilient hybrid approach, open architectures and unified management is needed for effective cybersecurity architectures.

Jul 24 9 min read
Nikoloz Kokhreidze from Mandos: 5 Strategies for Cybersecurity Leaders to Influence Without Authority

5 Strategies for Cybersecurity Leaders to Influence Without Authority

Discover 5 powerful strategies for cybersecurity leaders to influence without authority. Learn how to build trust, tell compelling stories, cultivate champions, leverage reciprocity, and align security with business outcomes.

Jul 18 6 min read
The challenges of ciso role and how to succeed mandos nikoloz kokhreidze

The CISO Role is Becoming Impossible - Here is How to Succeed

Learn about the challenges that make the CISO role feel impossible, from the ever-expanding scope of responsibilities to the war for cybersecurity talent. Discover strategies for success, including staying agile, partnering with the business, and prioritizing ruthlessly.

Apr 17 6 min read

Ready to Transform from Technical Expert to Strategic Leader?

Join the Mandos community and get the insights, frameworks, and support you need to lead with confidence

Trusted by security professionals at